Identifying and Analyzing Security Threats to Virtualized Cloud Computing Infrastructures

被引:0
|
作者
Brohi, Sarfraz Nawaz [1 ]
Bamiah, Mervat Adib [1 ]
Brohi, Muhammad Nawaz
Kamran, Rukshanda
机构
[1] Univ Teknologi Malaysia, Johor Baharu, Malaysia
关键词
Virtualization; Virtual Machine Monitor; Attacks and Vulnerabilities; Security Tools and Techniques;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A multi-tenant Cloud Computing Infrastructure (CCI) consists of several Virtual Machines (VMs) running on same physical platform by using virtualization techniques. The VMs are monitored and managed by kernel based software i.e. Virtual Machine Monitor (VMM) or hypervisor which is main component of Virtualized Cloud Computing Infrastructure (VCCI). Due to software based vulnerabilities, VMMs are compromised to security attacks that may take place from inside or outside attackers. In order to formulate a secure VCCI, VMM must be protected by implementing strong security tools and techniques such as Encryption and Key Management (EKM), Access Control Mechanisms (ACMs), Intrusion Detection Tools (IDTs), Virtual Trusted Platform Module (vTPM), Virtual Firewalls (VFs) and Trusted Virtual Domains (TVDs). In this research paper we describe the techniques of virtualizing a CCI, types of attacks on VCCI, vulnerabilities of VMMs and we critically describe the significance of security tools and techniques for securing a VCCI.
引用
收藏
页码:151 / 155
页数:5
相关论文
共 50 条
  • [1] Big Data Based Security Analytics for Protecting Virtualized Infrastructures in Cloud Computing
    Thu Yein Win
    Tianfield, Huaglory
    Mair, Quentin
    [J]. IEEE TRANSACTIONS ON BIG DATA, 2018, 4 (01) : 11 - 25
  • [2] Identifying Cloud Security Threats to Strengthen Cloud Computing Adoption Framework
    Khan, Nabeel
    Al-Yasiri, Adil
    [J]. 11TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS (FNC 2016) / THE 13TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING (MOBISPC 2016) / AFFILIATED WORKSHOPS, 2016, 94 : 485 - 490
  • [3] SECURITY THREATS IN CLOUD COMPUTING
    Kajal, Neha
    Ikram, Nikhat
    Prachi
    [J]. 2015 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION & AUTOMATION (ICCCA), 2015, : 691 - 694
  • [4] Security Threats in Cloud Computing
    Deshpande, Prachi
    Sharma, S. C.
    Sateeshkumar, P.
    [J]. 2015 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION & AUTOMATION (ICCCA), 2015, : 632 - 636
  • [5] Security Threats in Cloud Computing
    Gupta, Harsh
    Kumar, Deepak
    [J]. PROCEEDINGS OF THE 2019 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICCS), 2019, : 1158 - 1162
  • [6] Cloud Service Feature driven Security Policies for Virtualized Infrastructures
    Chandramouli, Ramaswamy
    [J]. WMSCI 2011: 15TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL I, 2011, : 166 - 171
  • [7] Security Threats and Solutions in Cloud Computing
    Eken, Hamm
    [J]. 2013 WORLD CONGRESS ON INTERNET SECURITY (WORLDCIS), 2013, : 139 - 143
  • [8] Security threats of virtualization in cloud computing
    [J]. Wang, H. (permutation@163.com), 1600, Huazhong University of Science and Technology (40):
  • [9] Mobile Cloud Computing: Security Threats
    Vikas, Solanke S.
    Gurudatt, Kulkarni A.
    Pawan, Katgaonkar
    Shyam, Gupta
    [J]. 2014 INTERNATIONAL CONFERENCE ON ELECTRONICS AND COMMUNICATION SYSTEMS (ICECS), 2014,
  • [10] Security Threats in Cloud Computing Environments
    Lee, Kangchan
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2012, 6 (04): : 25 - 32